Zoom Workplace Apps Vulnerability Let Attackers Inject Malicious Script

Zoom has released updates to address multiple vulnerabilities affecting its Workplace applications across various platforms. The most pressing flaw could allow attackers to inject malicious scripts, potentially compromising the integrity of user data. Users are strongly encouraged to apply the latest updates to protect themselves. The vulnerabilities, detailed in Zoom Security Bulletin ZSB-25013, affect a […] The post Zoom Workplace Apps Vulnerability Let Attackers Inject Malicious Script appeared first on Cyber Security News.

Apr 9, 2025 - 09:20
 0
Zoom Workplace Apps Vulnerability Let Attackers Inject Malicious Script

Zoom has released updates to address multiple vulnerabilities affecting its Workplace applications across various platforms.

The most pressing flaw could allow attackers to inject malicious scripts, potentially compromising the integrity of user data. Users are strongly encouraged to apply the latest updates to protect themselves.

The vulnerabilities, detailed in Zoom Security Bulletin ZSB-25013, affect a wide range of Zoom Workplace applications, including desktop apps for Windows, macOS, and Linux and mobile apps for iOS and Android.

The VDI Client for Windows, Zoom Rooms Controller, Zoom Rooms Client, and Zoom Meeting SDK across different operating systems are also impacted.

Cross-Site Scripting Vulnerability (CVE-2025-27441, CVE-2025-27442)

The most severe vulnerability is a cross-site scripting (XSS) flaw (CVE-2025-27441, CVE-2025-27442) that carries a CVSS score of 4.6, classifying it as a medium severity issue. The vulnerability exists in some Zoom Workplace Apps.

An unauthenticated attacker with adjacent network access could exploit this vulnerability to inject malicious scripts. Successful exploitation could lead to a loss of integrity.

The CVSS vector string associated with this vulnerability is CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N.

Insecure Default Variable Initialization (CVE-2025-27443)

Another vulnerability (CVE-2025-27443) affects Zoom Workplace Apps for Windows and is related to insecure default variable initialization. An authenticated local user could exploit this vulnerability to conduct a loss of integrity.

This vulnerability has a CVSS score of 2.8, which means it is a low-severity issue.

Null Pointer Dereference Vulnerabilities (CVE-2025-30670, CVE-2025-30671, CVE-2025-30672)

Multiple null pointer dereference vulnerabilities (CVE-2025-30670, CVE-2025-30671, CVE-2025-30672) exist in Zoom Workplace Apps for Windows. An authenticated user could exploit these vulnerabilities to cause a denial of service via network access.

These vulnerabilities have a CVSS score of 5.4 and are considered medium severity.

Affected Products and Versions

The vulnerabilities affect the following products:

  • Zoom Workplace Desktop App for Windows before version 6.3.10
  • Zoom Workplace Desktop App for macOS before version 6.3.10
  • Zoom Workplace Desktop App for Linux before version 6.3.10
  • Zoom Workplace App for iOS before version 6.3.10
  • Zoom Workplace App for Android before version 6.3.10
  • Zoom Workplace VDI Client for Windows before version 6.2.12 (except version 6.1.16)
  • Zoom Rooms Controller for Windows before version 6.4.0
  • Zoom Rooms Controller for macOS before version 6.4.0
  • Zoom Rooms Controller for Linux before version 6.4.0
  • Zoom Rooms Controller for Android before version 6.4.0
  • Zoom Rooms Client for Windows before version 6.4.0
  • Zoom Rooms Client for macOS before version 6.4.0
  • Zoom Rooms Client for Android before version 6.4.0
  • Zoom Rooms Client for iPad before version 6.4.0
  • Zoom Meeting SDK for Windows before version 6.3.10
  • Zoom Meeting SDK for iOS before version 6.3.10
  • Zoom Meeting SDK for Android before version 6.3.0
  • Zoom Meeting SDK for macOS before version 6.3.0
  • Zoom Meeting SDK for Linux before version 6.3.0

Update Now

Zoom has released updated versions of the affected applications to address these vulnerabilities. Users are advised to update to the latest versions as soon as possible. Updates can be downloaded from the Zoom website.

Zoom Engineering Security and fre3dm4n reported these vulnerabilities to Zoom.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

The post Zoom Workplace Apps Vulnerability Let Attackers Inject Malicious Script appeared first on Cyber Security News.